WO2017074281A1 - Système et procédé d'authentification multidimensionnelle destinés à des transactions bancaires sans carte et autres transactions impliquant un haut niveau de sécurité - Google Patents

Système et procédé d'authentification multidimensionnelle destinés à des transactions bancaires sans carte et autres transactions impliquant un haut niveau de sécurité Download PDF

Info

Publication number
WO2017074281A1
WO2017074281A1 PCT/TR2016/050312 TR2016050312W WO2017074281A1 WO 2017074281 A1 WO2017074281 A1 WO 2017074281A1 TR 2016050312 W TR2016050312 W TR 2016050312W WO 2017074281 A1 WO2017074281 A1 WO 2017074281A1
Authority
WO
WIPO (PCT)
Prior art keywords
transaction
password
user
gsm
authentication
Prior art date
Application number
PCT/TR2016/050312
Other languages
English (en)
Inventor
Hamit BAL
Abdussamet ARSLAN
Original Assignee
DOGAN, Mustafa Cemal
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by DOGAN, Mustafa Cemal filed Critical DOGAN, Mustafa Cemal
Priority to EP16784599.9A priority Critical patent/EP3369059A1/fr
Publication of WO2017074281A1 publication Critical patent/WO2017074281A1/fr

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/32Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/32Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
    • G06Q20/321Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices using wearable devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/32Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
    • G06Q20/325Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices using wireless networks
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/32Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
    • G06Q20/325Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices using wireless networks
    • G06Q20/3255Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices using wireless networks using mobile network messaging services for payment, e.g. SMS
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F9/00Details other than those peculiar to special kinds or types of apparatus
    • G07F9/001Interfacing with vending machines using mobile or wearable devices

Definitions

  • the invention relates to a server and GSM backed, cardless banking transactions (ATM and POS) and access to high-level security systems without using a magnetic card or key.
  • ATM and POS cardless banking transactions
  • the invention relates to a method that allows making GSM confirmed banking operations (e.g., cardless POS transactions or ATM procedures) with GSM-SIM card integrated mobile devices or wearables without using a card; and it is also a system and method for entering areas with high-level security using a server and GSM backed authentication rather than using a key or a magnetic ID card.
  • GSM confirmed banking operations e.g., cardless POS transactions or ATM procedures
  • GSM-SIM card integrated mobile devices or wearables without using a card
  • Prior Art Magnetic Stripe Card In magnetic strip technology, digital data is encrypted on a magnetic strip. Data is inscribed from end-to-end by changing polarity of particles of magnetic material similar to placing a set of magnets. Reading equipment detects inversions on the magnetic field where all these miniature magnets have inverse polarity (e.g., S-N and N-S) and this is perceived as reverse current. Decoder reads reverse currents and translates these to letters and numbers for computer operations.
  • inverse polarity e.g., S-N and N-S
  • HiCo increases security by minimizing accidental data deletion or damages.
  • Most common magnetic strips are on credit and debit cards used in ATMs and POS terminals. Magnetic strips are also used for entering buildings, hotel rooms and other facilities with security.
  • Barcode Cards Barcode is the common name for encoding data with symbols generated with bars and spaces; these symbols are sent to electronic environment using optical readers. A barcode is simply a series of black bars and white spaces used for encoding a series of characters. Easy and cost efficient generation of these symbols and low error rate compared to other Technologies enables common use of barcode technology. Barcode cards are commonly used in Customer Loyalty systems with barcode readers. It is also cost efficient compared to other Technologies. Usually used in access control systems and personnel control systems. Barcode cards can be personalized using photos and logos. Barcode cards are more economical than other card systems. No physical contact with card reader is required; therefore, no frictions or deformation. Enables faster and hassle-free personnel entry. Commonly used in Customer Loyalty programs. It's not possible to use without taking out of pockets, wallets or bags.
  • a contact card has an embedded processor. Uses various encryption techniques and has copy protection. Personalized software can be developed with these cards and customer information can be stored. Chip technology minimizes security risks such as copying or fraud which are more common in magnetic cards.
  • Proximity cards are contactless cards used in secure pass and payment systems and has 125khz frequency. They are compatible with ISO standards and same size with credit cards. Both sides are thermal print compatible. They are also known as Proxy Cards and can be used within a range of 0-5 cm. they can be used without taking out of a wallet. Low cost of these cards make them suitable for big companies with large number of personnel. Copying is all but impossible.
  • Mifare System uses smart cards with an embedded microchip and a software. They are practical and embedded micro-processor is water and weather proof. Information stored on Mifare Cards cannot be copied. Data stored cannot be lost or harmed. Magnets or magnetic fields cannot affect these cards. Does not create or emit magnetic waves due to its Passive Card feature.
  • a 13.56Mhz Mifare Card embodies a chip and an antenna. Data on chip can be read or stored through radio frequency without a card loader. Proximity depends on the type of reader and ranges between 2-5 cm. Contactless smartcards provides speed and convenience. Mifare Cards are used commonly in Student IDs, e-passports, parking systems and automated payment systems. Preliminary research by patent research bureau for present invention and technique revealed following conclusions:
  • CN1804906 A (Abstract of CN1804906 Method of application of two- dimensional code and mobile telephone in credit card-based payment system)
  • Chinese patent document a credit card based mobile payment system using a two- dimensional code is mentioned.
  • mobile phone scans and stores 2D code and involves a screen to display the code.
  • Description of the document reveals that, user can request more than 1 credit card and related 2D codes therefore these requests are confirmed via passwords, voice, text, network or other methods necessary.
  • the present invention relates to a method that, other than techniques described above, meets requirements, eliminates all disadvantages, provides additional advantages and enables a more secure authentication, allows making GSM
  • confirmed banking operations e.g., cardless POS transactions or ATM procedures
  • GSM-SIM card integrated mobile devices or wearables e.g., glasses, watch
  • it is also a system and method for entering areas with high- level security using a server and GSM backed authentication rather than using a key or a magnetic ID card.
  • the object of the invention is to provide a system and method that enables banks to provide shopping and POS transaction opportunities to their customers without the need to use a magnetic card and provide more security in ATM transactions.
  • Another object of the invention relates to a server based authentication and transaction system and method used with GSM SIM Card integrated mobile Technologies.
  • Object of the invention relates to a system and method, providing a range of options in customer acquisition, account opening and account check for banks and individuals without the need to use a magnetic card (e.g., Mastercard, Visa).
  • a magnetic card e.g., Mastercard, Visa
  • Object of the invention relates to a server and GSM backed system and method for increasing security level not only in banking transactions but also in high-level security building entrances and opening doors.
  • Most important object of this invention relates a system and a method to increase security of system login process by creating temporary sessions and adding a single use password to encrypt data in each login request (server-user-process request- reader) and if this data is acquired by third parties, it will be a useless encrypted data (after temporary session is terminated, data on screen and encrypted data read by reader has no value).
  • Object of the invention relates to a system and method that enables mobile device as a login tool; user's personal data is not stored on SIM Card or in user's mobile device.
  • invention involves a server and GSM backed system that enables cardless banking transactions (ATM and POS) without the need to use any magnetic card, and an authenticator for logging in to other high- level security systems.
  • Figure 1 shows a server and GSM backed multi-dimensional authorization system for access to high-level security systems.
  • FIG 2 shows processes executed in temporary session server (Detailing Temporary session server (100) in Figure 1 ).
  • 100 refers to authentication and transaction confirmation center (servers). There are two interconnected structures in authentication and transaction confirmation center (101 , 102)
  • Main server 101 refers to main server within Authentication and transaction confirmation center.
  • Main server stores user ID authentication data and transaction data.
  • 102 refers to temporary/short term session and encryption servers, that are located within authentication and transaction confirmation center and where temporary sessions are created, stored and deleted when expired.
  • user data Figure 2; 102-a
  • One or more than one transaction number and temporary password can be generated (This number depends on the number of accounts and cards user has in bank). Therefore, encrypted data displayed on user's device changes in each session and deleted when the session is terminated.
  • 200 refers to GSM operator. Plays an active role in user authentication process. It is used to verify device, SIM card and the application. Therefore, users who want to use the system should have a registered SIM Card and a number on that GSM operator. Applet installed to mobile device is matched with Sim Card ID.
  • 300 refers to user interface. This interface can be a mobile device with GSM operator's SIM card or other mobile devices with screens (phone, tablet or wearable technologies such as a smart watch).
  • 301 refers to GSM operator's SIM Card registered to user. This SIM
  • SIM Card works integrated with the mobile device (300)
  • SIM Card number refers to user ID. This ID can be used to communicate with the server.
  • Authentication ve transaction confirmation center applet (application) installed to user interface.
  • This application and mobile device does not store any personal information or data (password, account, etc.).
  • This application is an interface that enables user to connect to the server (100) (101 ) (102).
  • Application works integrated with SIM and is identified by SIM Card and main server. If SIM is inserted to another device, application must be installed to that device and security checks of main server should be confirmed by user-account owner.
  • This unit 400 refers to reader which sends requested transaction to main servers (100) (101 ) (102).
  • This unit refers to barcode, 2D code (encrypted data) readers installed to POS devices used in payments and ATMs, or units that read and send encrypted data ( Figure 2; 102-c) displayed on the user's device to main server during authentication process. It's a device that reads data on user's device and sends that data (depending on the transaction/process requested) to main server.
  • This request can be a payment request on POS devices or login request on ATM. It can also send request for opening a door.
  • ID SIM No, Application ID
  • GSM registered operator
  • GSM operator (200) sends a random password to user's SIM Card via SMS for device authentication.
  • Half-open application on user's device sends password, received from GSM operator, to main server (101 ) for device authentication.
  • Application opens after first password is sent as in Step 1 , confirmed by GSM and Steps 3 and 4 are performed, i.e., in 5 steps.
  • Main server (101 ) sends request to other server (102) to perform transaction/process and opens a temporary session.
  • Temporary session duration ranges between 30 seconds to 240 seconds and can be adjusted based on task's importance.
  • basic user data required for performing the transaction (Figure2; 102-a) (e.g., card number or IBAN) is encrypted by combining with a random password composed of a series of numeric numbers ( Figure 2; 102-b) ( Figure 2; 102-c).
  • Encrypted data can be a 2D Code as well as another code depending on the type of reader (400).
  • Encrypted data displayed on user interface is read by reader (400).
  • Reader (400) reads (deciphers) data on user's device, adds transaction request data and sends to mains servers (100).
  • This request data refers to payment on POS, login request on ATM, or request for opening a door on secure doors).
  • Transaction request from reader (400) is sent to user interface for user confirmation (300) (302). 10.
  • User is asked to enter password to confirm request.
  • Transaction confirmation password is sent to main server (101 ).
  • main server checks for any temporary sessions created for transaction/process.
  • Transaction is performed on main servers and both user (300) and reader (400) is informed; temporary session (102) created for this request is terminated.
  • 102-a refers to necessary data imported from main server for transaction/process in temporary session, after first password sent to main server is verified and device authentication is completed.
  • This data can be IBAN, card number or any other data for banking transactions as well as personal data required for other processes (Subscription number, TCKN or other numeric data).
  • 102-b refers to random password defined by server after temporary session is created.
  • 102-c refers to re-encrypted data sent to user's device (300) (302) to be read by reader (400) during active session. This refers to re- encrypted data which is a combination of identification data on 102-a and random password defined on 102-b.
  • session is expired, data generated for user is deleted from servers and session is terminated.
  • Figure 3 Reference Numbers; log in to application (302) with password on mobile device (300) for connecting to system 502 Verification of password entered by user and sent to main server,
  • main server (101 ) If password sent to main server (101 ) is correct, send password to SIM via GSM network (200) for device and SIM verification.
  • 505 Send password (which was sent to SIM) to main server via application for device and SIM verification. Check if password delivered via GSM network is sent to main server by the application. 506 Close the application, if password sent to SIM number via GSM network is not sent back.
  • Encrypted data (300) is displayed on user's device to be read by reader.
  • Encrypted data (barcode, 2D code) on mobile device (300) is read by reader.
  • the invention relates to a method that, other than techniques described above, meets requirements, eliminates all disadvantages, provides additional advantages and enables a more secure authentication, allows making GSM confirmed banking operations (e.g., cardless POS transactions or ATM procedures) with GSM-SIM card integrated mobile devices or wearables (e.g., glasses, watch) without using a card; and it is also a system and method for entering areas with high-level security using a server and GSM backed authentication rather than using a key or a magnetic ID card.
  • Figure 1 Object of this invention involves a system and method that enables banks to provide shopping and POS transaction opportunities to their customers without the need to use a magnetic card and provide more security in ATM transactions.
  • Invention involves a system and method based on authentication and transaction confirmation servers (100) (101 ) (102) and GSM backed (400) security for reader requests (400) sent via a SIM Card integrated mobile device (300).
  • Invention is composed of a security (100) (200) authentication and transaction center performing two intermediary systems' (a SIM Card integrated mobile device (300) and requestor reader (400)) requests. No data is stored on login device or reader and they both serve as intermediaries for transactions. All transactions and authentications take place on servers (100) (101 ) (102) and on GSM network, therefore it's completely secure. As follows;
  • system login application (302) is installed to mobile device (300). This is the initial installation and application does not store ant data (e.g., personal data, passwords, etc.)
  • Mobile device needs a SIM (301 ) for GSM network connection for the system to be operable. Passwords used in this system can be obtained from authentication and confirmation center via individual application.
  • application works only on identified device and SIM combination. Application is associated with only 1 SIM and Works on a single device. Application works integrated with SIM Card ID (number) and if SIM is inserted to another device application must be re-installed and authentication process must be completed. Application will be active after being installed to device and registeration to authentication transaction confirmation center. Instructions shown in Figure 1 are as follows:
  • Application on (302) device sends password request to (101 ) Authentication server. Password confirmation performed on (101 ) server. If password and user match, device authentication is performed.
  • a confirmation password is sent to user's GSM (200) number that is registered on system for device authentication.
  • Authentication password is sent ti SIM Card via GSM (200) network. After authentication message is delivered to the application (301 ) on mobile device (300), main server is informed that device and application ID are correct.
  • This encrypted data ( Figure 2; 102-c) created on temporary session servers (102) is displayed on user's device through the application (302). If more than 1 encrypted data is available in a session, they are listed horizontally or vertically.
  • Preferred encrypted data ( Figure 2; 102-c) is read by reader (400) (POS, ATM).
  • Reader (400) sends transaction request to main servers (101 ) after reading encrypted data ( Figure 2; 102-c) on user's device (payment on POS devices or display main menu on ATM) (400). Reader must be registered to main servers and have transaction request authorization. If reader is not registered, no request will be sent to main server (101 ).
  • Request from registered reader is displayed on user's device with a confirmation via open application ( .... TL / $ paymetn will be made from account no to company. Enter password for confirmation or enter your PIN fro banking transactions - on ATM) and request second password. 10. User (300) enters password for confirmation and password is sent to main server (100).
  • Main server verifies password and if password is correct checks for an available temporary session specific to this request. If a temporary session is available proceeds to final step.
  • authentication and transaction confirmation center (100) performs the transaction/process requested, (payment, ATM login). Transaction confirmation is displayed both on user's device (300) and reader's screen (400). Data is deleted after temporary session (102) on confirmation transaction center (1 00) is terminated.
  • This invention may replace current magnetic cards (Mastercard, Visa) as well as enable users to perform banking transactions (account opening) without using these cards, (e.g., performing banking transactions with IBAN).
  • Invention may be used in aforementioned banking transactions as well as for entering areas with high-level security (hotels, hotel rooms, buildings, houses, offices). Invention involves a method for opening building doors by sending request to main servers which sends confirmation to door lock after authentication process.
  • GSM - Authentication is GSM based therefore GSM network also allows device verification.
  • Mobile wallets are using mobile phones and store card information or passwords. In this method, no data is stored on user's device. Security and personal data (account information, passwords, numbers, subscription details, etc.) is located solely in main servers.
  • Invention can be used in all systems that require entry or transactions with magnetic cards. Specifically, cardless payments and banking transactions are gaining importance with ever increasing internet connection speeds. Therefore, invention enables fast and secure POS payments and ATM transactions.
  • no data is stored on mobile device and even first login password is verified by authentication center server.
  • no data is stored on mobile device and even first login password is verified by authentication center server.
  • it is not a system access method but also has a GSM based device and SIM verification.
  • it has a single use login and authentication system with temporary separate sessions in each login.
  • transaction confirmation is performed by user with a second password.

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Security & Cryptography (AREA)
  • Finance (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

La présente invention concerne un procédé qui permet de réaliser des transactions bancaires confirmées par GSM (p. ex., transactions de point de service (POS) sans carte ou procédures de guichet automatique bancaire (ATM)) avec des dispositifs mobiles à carte GSM-SIM intégrée ou des dispositifs vestimentaires sans l'aide d'une carte; c'est également un système et un procédé destinés à entrer dans des endroits nécessitant une sécurité spécifique à l'aide d'un serveur et d'une autorisation basée sur GSM plutôt qu'à l'aide d'une clé ou une carte d'identité magnétique. L'invention prend une demande d'entrée de mot de passe de l'utilisateur, fait les vérifications nécessaires dans le serveur principal (100) et utilise le réseau GSM (200) pour la vérification de dispositif. Elle implique également une vérification d'identifiant à 5 couches et un procédé de confirmation de transaction; après la vérification d'identification (300), de dispositif (301) et d'application (302), elle se connecte à une session temporaire pour la transaction demandée dans un serveur différent (102); les données disponibles (figure 2, 102-a) qui seront utilisées pour la transaction de cette session temporaire, seront chiffrées avec un mot de passe aléatoire à usage unique (figure 2, 102-b) dans chaque session et seront disponibles pour être utilisées dans le dispositif mobile de l'utilisateur devant être lu par lecteur (400); et enfin la demande de transaction (400) du lecteur sera confirmée par l'utilisateur en entrant le mot de passe.
PCT/TR2016/050312 2015-10-27 2016-08-29 Système et procédé d'authentification multidimensionnelle destinés à des transactions bancaires sans carte et autres transactions impliquant un haut niveau de sécurité WO2017074281A1 (fr)

Priority Applications (1)

Application Number Priority Date Filing Date Title
EP16784599.9A EP3369059A1 (fr) 2015-10-27 2016-08-29 Système et procédé d'authentification multidimensionnelle destinés à des transactions bancaires sans carte et autres transactions impliquant un haut niveau de sécurité

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
TR2015/13407 2015-10-27
TR201513407 2015-10-27

Publications (1)

Publication Number Publication Date
WO2017074281A1 true WO2017074281A1 (fr) 2017-05-04

Family

ID=57178463

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/TR2016/050312 WO2017074281A1 (fr) 2015-10-27 2016-08-29 Système et procédé d'authentification multidimensionnelle destinés à des transactions bancaires sans carte et autres transactions impliquant un haut niveau de sécurité

Country Status (2)

Country Link
EP (1) EP3369059A1 (fr)
WO (1) WO2017074281A1 (fr)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112396424A (zh) * 2019-08-15 2021-02-23 京东数字科技控股有限公司 一种融合即时通讯系统的交易方法及系统
EP4047488A1 (fr) * 2021-02-20 2022-08-24 Facebook, Inc. Lecture au niveau de la session de cohérence d'écritures parmi des versions de données numériques dans un réseau distribué
US11681995B1 (en) 2020-11-06 2023-06-20 Wells Fargo Bank, N.A. Point of sale (POS) device for currency control
US11829976B1 (en) 2020-11-06 2023-11-28 Wells Fargo Bank, N.A. Apparatuses, computer-implemented methods, and computer program products for currency control

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1804906A (zh) 2006-01-05 2006-07-19 福建新大陆电脑股份有限公司 二维码和移动电话在信用卡支付系统的应用方法
US20080091614A1 (en) * 2004-07-30 2008-04-17 Etrans Lc Method To Make Payment Or Charge Safe Transactions Using Programmable Mobile Telephones
US20120173311A1 (en) 2010-12-31 2012-07-05 Nautilus Hyosung Inc. Automatic teller machine for providing service using two-dimensional barcode and method for operating automatic teller machine
US20120185398A1 (en) * 2009-09-17 2012-07-19 Meir Weis Mobile payment system with two-point authentication
EP2523155A2 (fr) * 2011-05-13 2012-11-14 Deutscher Sparkassen Verlag GmbH Procédé d'attribution de données techniques d'un terminal NFC, d'une carte à puce NFC et d'une transaction
US20130124855A1 (en) * 2011-11-14 2013-05-16 Ca, Inc. Using qr codes for authenticating users to atms and other secure machines for cardless transactions
CN103218884A (zh) 2012-11-29 2013-07-24 彭超 一种应用手机二维码技术的公交刷卡系统
US20130297513A1 (en) * 2012-05-04 2013-11-07 Rawllin International Inc. Multi factor user authentication
WO2014055279A1 (fr) 2012-10-01 2014-04-10 Acuity Systems, Inc. Système d'authentification
WO2015088638A1 (fr) * 2013-10-11 2015-06-18 Sequent Software, Inc. Système et procédé d'autorisation de paiement dynamique temporaire dans un dispositif de communication portable

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080091614A1 (en) * 2004-07-30 2008-04-17 Etrans Lc Method To Make Payment Or Charge Safe Transactions Using Programmable Mobile Telephones
CN1804906A (zh) 2006-01-05 2006-07-19 福建新大陆电脑股份有限公司 二维码和移动电话在信用卡支付系统的应用方法
US20120185398A1 (en) * 2009-09-17 2012-07-19 Meir Weis Mobile payment system with two-point authentication
US20120173311A1 (en) 2010-12-31 2012-07-05 Nautilus Hyosung Inc. Automatic teller machine for providing service using two-dimensional barcode and method for operating automatic teller machine
EP2523155A2 (fr) * 2011-05-13 2012-11-14 Deutscher Sparkassen Verlag GmbH Procédé d'attribution de données techniques d'un terminal NFC, d'une carte à puce NFC et d'une transaction
US20130124855A1 (en) * 2011-11-14 2013-05-16 Ca, Inc. Using qr codes for authenticating users to atms and other secure machines for cardless transactions
US8924712B2 (en) 2011-11-14 2014-12-30 Ca, Inc. Using QR codes for authenticating users to ATMs and other secure machines for cardless transactions
US20130297513A1 (en) * 2012-05-04 2013-11-07 Rawllin International Inc. Multi factor user authentication
WO2014055279A1 (fr) 2012-10-01 2014-04-10 Acuity Systems, Inc. Système d'authentification
CN103218884A (zh) 2012-11-29 2013-07-24 彭超 一种应用手机二维码技术的公交刷卡系统
WO2015088638A1 (fr) * 2013-10-11 2015-06-18 Sequent Software, Inc. Système et procédé d'autorisation de paiement dynamique temporaire dans un dispositif de communication portable

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
ANONYMOUS: "Zwei-Faktor-Authentifizierung - Wikipedia", 27 April 2015 (2015-04-27), XP055326948, Retrieved from the Internet <URL:https://de.wikipedia.org/w/index.php?title=Zwei-Faktor-Authentifizierung&oldid=141533197> [retrieved on 20161207] *

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112396424A (zh) * 2019-08-15 2021-02-23 京东数字科技控股有限公司 一种融合即时通讯系统的交易方法及系统
CN112396424B (zh) * 2019-08-15 2024-02-02 京东科技控股股份有限公司 一种融合即时通讯系统的交易方法及系统
US11681995B1 (en) 2020-11-06 2023-06-20 Wells Fargo Bank, N.A. Point of sale (POS) device for currency control
US11829976B1 (en) 2020-11-06 2023-11-28 Wells Fargo Bank, N.A. Apparatuses, computer-implemented methods, and computer program products for currency control
EP4047488A1 (fr) * 2021-02-20 2022-08-24 Facebook, Inc. Lecture au niveau de la session de cohérence d'écritures parmi des versions de données numériques dans un réseau distribué

Also Published As

Publication number Publication date
EP3369059A1 (fr) 2018-09-05

Similar Documents

Publication Publication Date Title
US11157905B2 (en) Secure on device cardholder authentication using biometric data
CN1307594C (zh) 付款方法
US10607211B2 (en) Method for authenticating a user to a machine
US10706136B2 (en) Authentication-activated augmented reality display device
CN1344396B (zh) 便携式电子的付费与授权装置及其方法
US7571461B2 (en) Personal website for electronic commerce on a smart Java card with multiple security check points
US20110142234A1 (en) Multi-Factor Authentication Using a Mobile Phone
EP3098786A1 (fr) Transactions emv dans des terminaux mobiles
US20080126260A1 (en) Point Of Sale Transaction Device With Magnetic Stripe Emulator And Biometric Authentication
EP4221091A1 (fr) Cryptogramme de liaison avec des caractéristiques de protocole
WO2008147457A1 (fr) Dispositif de transaction de point de vente équipé d&#39;un émulateur de bande magnétique et d&#39;une authentification biométrique
EP3186739B1 (fr) Authentification du titulaire de carte sécurisée réalisée sur le dispositif à l&#39;aide des données biométriques
AU2018214800A1 (en) Methods and systems for securely storing sensitive data on smart cards
CN105556550A (zh) 用于保护在线交易的验证步骤的方法
WO2017074281A1 (fr) Système et procédé d&#39;authentification multidimensionnelle destinés à des transactions bancaires sans carte et autres transactions impliquant un haut niveau de sécurité
CN104951939A (zh) 电子银行卡系统及其应用方法、银行卡的电子化方法
KR20000012607A (ko) 무선단말기를 이용한 인증시스템
US11823200B2 (en) Smart physical payment cards
CN114207578A (zh) 移动应用程序集成
KR102122555B1 (ko) 사용자가 소지한 금융 카드 기반 본인 인증 시스템 및 방법
US20200005306A1 (en) Method for carrying out a transaction, corresponding terminal, server and computer program
US10503936B2 (en) Systems and methods for utilizing magnetic fingerprints obtained using magnetic stripe card readers to derive transaction tokens
El Madhoun et al. The EMV Payment System: Is It Reliable?
WO2014003684A1 (fr) Terminal et procédé d&#39;authentification
EP3404600A1 (fr) Procédé d&#39;authentification d&#39;utilisateur puissant sur des dispositifs de paiement non virtuels

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 16784599

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE